____ assigns a level of business importance, availability, sensitivity, security and regulation requirements to data.

data classification

____ means permissions given to a higher level “parent” will also be inherited by a lower level “child.”

inheritance

____ is the process for generating, transmitting, storing, analyzing, and disposing of computer security log data.

log managment

____ servers are intermediate hosts through which Web sites are accessed.

proxy

____ logs can be used to determine whether new IP addresses are attempting to probe the network and if stronger firewall rules are necessary to block them.

firewall

A(n) ____ is an occurrence within a software system that is communicated to users or other programs outside the operating system.

event

____ are operational actions that are performed by the operating system, such as shutting down the system or starting a service.

system events

Logs based on ____ are the second common type of security-related operating system logs.

audit records

____ refers to a methodology for making changes and keeping track of those changes, often manually.

change managment

. ____ monitoring is designed for detecting statistical anomalies.

anomaly based

____ monitoring compares activities against a predefined signature.

signature-based

A ____ baseline is a reference set of data established to create the “norm” of performance for a system or systems.

performance baseline

A ____ monitor is typically a low-level system program that uses a notification engine designed to monitor and track down hidden activity on a desktop system, server, or even personal digital assistant (PDA) or cell phone.

system

Changing the original text to a secret message using cryptography is known as ____.

encryption

Data that is in an unencrypted form is called ____ data.

cleartext

____, also called a one-way hash, is a process for creating a unique “signature” for a set of data.

hashing

____ is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations.

whirlpool

Symmetric encryption is also called ____ key cryptography.

private

The simplest type of stream cipher is a ____ cipher. It simply substitutes one letter or character for another.

permutation

A ____ substitution cipher maps a single plaintext character to multiple ciphertext characters.

homoaplhabetic

A ____ cipher rearranges letters without changing them.

transposition

A ____ cipher manipulates an entire block of plaintext at one time.

block

____ was approved by the NIST in late 2000 as a replacement for DES.

aes

____ is a block cipher that processes blocks of 64 bits.

rc2

The ____ algorithm dates back to the early 1990s and is used in European nations.

idea

____ encryption uses two keys instead of one. These keys are mathematically related and are known as the public key and the private key.

asymmetric

The asymmetric algorithm ____ was published in 1977 and patented by MIT in 1983.

rsa

The strength of the ____ algorithm is that it allows two users to share a secret key securely over a public network.

diffie-hellman

A similar program known as ____ is a PGP open-source product.

gpg

Microsoft's ____ is a cryptography system for Windows operating systems that use the Windows NTFS file system.

efs

Cryptography can also be applied to entire disks. This is known as ____ encryption.